Even if it was Flash that they exploited, that isn't important. What is important is that they were able to make code running in the sandbox break out of the sandbox. And all the user had to do was visit a webpage...
However, being based on zero day exploits, I don't expect the problem to last very long, even if VUPEN isn't willing to release details about what they actually did.
As I already mentioned, I'm more concerned about the second exploit mentioned that doesn't use a zero day exploit, instead, directly targeting the Chrome code. And doesn't need to break out of the sandbox because it completely avoids the sandbox. Of course, this guy is giving the specifics to Google, so it will be quickly fixed.
Either way you look at it, it still makes more sense to me to run Chrome inside a sandbox instead of merely relying on the browsers protection to keep you safe. This way the hacker must design code to break out of two sandboxes. Chrome's, and whatever else you happen to be running.